What makes an address “to monitor” instead of “to suppress”?
Addresses become to monitor when they are technically valid but exhibit early warning signs such as inconsistent engagement or belonging to a catch all domain. They are not immediately harmful but require observation before sending heavily.
Was this answer helpful?
Thanks for your feedback!